In this paper, a new encryption mode, which we call the 2D-Encryption Mode, is presented. 2D-Encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical prop...
详细信息
In this paper, a new encryption mode, which we call the 2D-Encryption Mode, is presented. 2D-Encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical properties. We first look at the type of problems it tries to solve, then describe the technique and its properties, and present a detailed mathematical analysis of its security, and finally discuss some practical issues related to its implementation.
Neurules are a type of hybrid rules combining a symbolic and a connectionist representation. There are two disadvantages of neurules. The first is that the created neurule bases usually contain multiple representation...
详细信息
Web-based curriculum development allows students to develop their learning portfolio and interact with peers on a Web learning system. This system contains Web portfolios that record in detail students' learning a...
Web-based curriculum development allows students to develop their learning portfolio and interact with peers on a Web learning system. This system contains Web portfolios that record in detail students' learning activities, peer interaction, and knowledge progress. However, teachers cannot easily diagnose students' learning processes and regulate effective strategies according to student activity performance without the model of activity performance on Web learning systems. This study proposes a novel methodology that employs Bayesian network software to assist teachers in efficiently deriving and utilizing the student model of activity performance from Web portfolios in an online manner. Teachers can assess and diagnose performances with the model of learning activity on Web learning systems. The model of activity performance also allows teachers to manage various activity performances in Web learning systems so that desired strategies can be achieved to promote learning effectiveness.
In many applications the image registration task turns out to be a fundamental prerequisite for any further processing and analysis. In the proposed paper a new efficient technique is presented, appropriate for regist...
详细信息
In many applications the image registration task turns out to be a fundamental prerequisite for any further processing and analysis. In the proposed paper a new efficient technique is presented, appropriate for registering images which are translated and rotated versions of a reference image. The technique consists of two main parts: an efficiently implemented prewhitening part, and an iterative part which yields the unknown displacements after a few iterations. The cross-correlation operations involved in the iterative part are performed efficiently via a new scheme based on a proper partitioning of the images and the use of the FFT. Note that this efficient scheme is also applicable to the conventional spatial cross-correlation method. The new registration technique exhibits a superior performance as compared to the conventional cross-correlation method.
In this paper we discuss our work on plan management in the Autominder cognitive orthotic system. Autominder is being designed as part of an initiative on the development of robotic assistants for the elderly. Automin...
详细信息
A novel hardware algorithm, architecture and an optimization technique for residue multipliers are introduced in this paper. The proposed architecture exploits certain properties of the bit products to achieve low-com...
详细信息
A novel hardware algorithm, architecture and an optimization technique for residue multipliers are introduced in this paper. The proposed architecture exploits certain properties of the bit products to achieve low-complexity implementation via a set of introduced theorems that allow the definition of a graph based design methodology. In addition the proposed multiplier employs the Canonic Signed Digit (CSD) encoding to minimize the number of bit products required to be processed. Performance data reveal that the introduced architecture achieves area/spl times/time complexity reduction of up to 55%, when compared to the most efficient previously reported design.
computer viruses pose an increasing risk to computer data integrity. They cause loss of valuable data and require an enormous effort in restoration/duplication of lost and damaged data. Each month many new viruses are...
详细信息
In this paper we describe a mechanism for redundant multicast transmission of multimedia data supporting adaptive QoS over the Internet and we investigate its behaviour using simulation. There are two major issues tha...
详细信息
In this paper we describe a mechanism for redundant multicast transmission of multimedia data supporting adaptive QoS over the Internet and we investigate its behaviour using simulation. There are two major issues that have to be considered when designing and implementing such a mechanism, the fairness, which is the ability to cope with receiver heterogeneity, and the adaptation schemes. The proposed mechanism uses a friendly to the network users congestion control policy to control the transmission of the data. We evaluate the adaptive multicast transmission mechanism through a number of simulations in order to examine its behaviour to a heterogeneous group of receivers and its behaviour against TCP and UDP data streams. The main conclusion of the simulation was that the proposed mechanism has friendly behaviour against the dominant traffic types of today's Internet and treats a heterogeneous group of receivers with fairness.
Two level carry look-ahead (CLA) and novel parallel-prefix Ling adder architectures are introduced in this paper. The adders resulting from these architectures, as well as from the well known single level CLA Ling add...
详细信息
Two level carry look-ahead (CLA) and novel parallel-prefix Ling adder architectures are introduced in this paper. The adders resulting from these architectures, as well as from the well known single level CLA Ling adder architecture, are compared against traditional adders using CMOS realizations. The results reveal that Ling architectures are more attractive in several cases.
暂无评论